Login / Signup
T-Proof: Secure Communication via Non-Algorithmic Randomization.
Gideon Samid
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
secure communication
smart card
secret key
public key
secret sharing
digital signature
security protocols
ad hoc networks
key management
network security
privacy preserving
key technologies
computing environments
chaotic systems
intrusion detection
resource sharing
information security